首页 > 最新文献

Data最新文献

英文 中文
Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach 基于加权聚合改进分割的社交网络重叠社区检测方法
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460632
R. Kashef
Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these techniques are computationally expensive. We have developed a fast-hierarchical algorithm using the notion of segmentation by weighted aggregation. Experimental results on synthetic and real benchmark networks show that the proposed algorithm effectively finds communities (Clusters) with varied overlap and non-exhaustiveness structures. Our method outperforms the state-of-the-art hierarchical clustering algorithms measured by the F-measure and the computational time.
检测社会网络中共同行为、兴趣和互动的社区对于建立网络结构模型至关重要。重叠社团检测是一个NP-Hard问题。提出了几种解决办法;然而,这些技术中的大多数在计算上都很昂贵。我们利用加权聚合分割的概念开发了一种快速分层算法。在合成和真实基准网络上的实验结果表明,该算法能有效地找到具有不同重叠和非穷竭结构的群体(聚类)。我们的方法优于由f度量和计算时间度量的最先进的分层聚类算法。
{"title":"Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach","authors":"R. Kashef","doi":"10.1145/3460620.3460632","DOIUrl":"https://doi.org/10.1145/3460620.3460632","url":null,"abstract":"Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these techniques are computationally expensive. We have developed a fast-hierarchical algorithm using the notion of segmentation by weighted aggregation. Experimental results on synthetic and real benchmark networks show that the proposed algorithm effectively finds communities (Clusters) with varied overlap and non-exhaustiveness structures. Our method outperforms the state-of-the-art hierarchical clustering algorithms measured by the F-measure and the computational time.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78689319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIEM Architecture for the Internet of Things and Smart City 面向物联网和智慧城市的SIEM架构
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460747
Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh
The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city that takes advantage of existing infrastructure and integrates it with the Internet of things technology to improve the quality of life. Internet of Things (IoT) sensors are distributed geographically around the city to collect data from the environment (i.e.: streets, cars, traffic lights...etc.), process, and manage it to provide intelligent actionable information to citizens. All data transferred through networks of a smart city may be threatened and susceptible to illegal actions such as violation, stealing, and inappropriate use. These security threats affect the privacy and security of users; where hackers can get access to user's data and gain control of their smart homes, cars, medical devices and might even gain control over city traffic lights. All the above enforce the need to have a security system that continuously monitors and tracks all data logs to detect any suspicious activity. In this paper, we propose a Security Information and Event Management (SIEM) approach for smart cities by forwarding event logs generated by smart devices to a security operation center that works around the clock to detect security incidents and handle them. Such an approach aims to create a safe smart living environment.
物联网(IoT)是一项新技术,它塑造了一个正在被连接到互联网的智能设备迅速入侵的世界的未来。这种技术在发展智慧城市的理念中发挥了巨大的作用。智慧城市是利用现有基础设施,并将其与物联网技术相结合,以提高生活质量的城市。物联网(IoT)传感器分布在城市各处,从环境中收集数据(如街道、汽车、交通信号灯等),对其进行处理和管理,为市民提供智能的可操作信息。通过智慧城市网络传输的所有数据都可能受到威胁,并容易受到违规、窃取和不当使用等非法行为的影响。这些安全威胁影响用户的隐私和安全;黑客可以访问用户数据,控制他们的智能家居、汽车、医疗设备,甚至可能控制城市交通信号灯。上述所有情况都表明需要有一个安全系统来持续监控和跟踪所有数据日志,以发现任何可疑活动。在本文中,我们提出了一种智能城市安全信息和事件管理(SIEM)方法,通过将智能设备产生的事件日志转发到一个全天候工作的安全运营中心,以检测和处理安全事件。这样做的目的是创造一个安全的智能生活环境。
{"title":"SIEM Architecture for the Internet of Things and Smart City","authors":"Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh","doi":"10.1145/3460620.3460747","DOIUrl":"https://doi.org/10.1145/3460620.3460747","url":null,"abstract":"The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city that takes advantage of existing infrastructure and integrates it with the Internet of things technology to improve the quality of life. Internet of Things (IoT) sensors are distributed geographically around the city to collect data from the environment (i.e.: streets, cars, traffic lights...etc.), process, and manage it to provide intelligent actionable information to citizens. All data transferred through networks of a smart city may be threatened and susceptible to illegal actions such as violation, stealing, and inappropriate use. These security threats affect the privacy and security of users; where hackers can get access to user's data and gain control of their smart homes, cars, medical devices and might even gain control over city traffic lights. All the above enforce the need to have a security system that continuously monitors and tracks all data logs to detect any suspicious activity. In this paper, we propose a Security Information and Event Management (SIEM) approach for smart cities by forwarding event logs generated by smart devices to a security operation center that works around the clock to detect security incidents and handle them. Such an approach aims to create a safe smart living environment.","PeriodicalId":36824,"journal":{"name":"Data","volume":"29 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74942194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data 重大抑郁时间序列数据的模糊交叉递归分析与张量分解
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460626
T. Pham, F. Y. A. Anezi
The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and tensor decomposition. The relationships between positive and negative mental states can be visualized and quantified using the proposed approach. The discovery of cross recurrences or dynamic correlations of the two opposite mental states can be helpful for targeted therapy in the management of personalized depression either under or without antidepressant drugs.
重性或临床抑郁症的复杂行为背后的机制被假设为一个动力系统。本研究采用模糊交叉递归图和张量分解的方法对重度抑郁症患者的情绪自评进行分析。积极和消极的心理状态之间的关系可以可视化和量化使用所提出的方法。发现两种相反精神状态的交叉复发或动态相关性有助于在使用或不使用抗抑郁药物的个体化抑郁症治疗中进行靶向治疗。
{"title":"Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data","authors":"T. Pham, F. Y. A. Anezi","doi":"10.1145/3460620.3460626","DOIUrl":"https://doi.org/10.1145/3460620.3460626","url":null,"abstract":"The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and tensor decomposition. The relationships between positive and negative mental states can be visualized and quantified using the proposed approach. The discovery of cross recurrences or dynamic correlations of the two opposite mental states can be helpful for targeted therapy in the management of personalized depression either under or without antidepressant drugs.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75654832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Regression analysis for network intrusion detection 网络入侵检测的回归分析
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460751
Arun Nagaraja, U. Boregowda, V. Radhakrishna
Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction using techniques such as PCA, SVD, feature selection, feature reduction techniques and application of classifier algorithms. Very less attention is paid on regression analysis for intrusion detection in the existing literature. There is a scope to apply regression-based analysis for intrusion detection. Regression analysis may be applied for dimensionality reduction, classification or prediction tasks. This paper throws light on the possibility of applying regression analysis for intrusion detection and outlines some of the contributions that addressed regression analysis to perform intrusion detection.
机器学习和统计学被归类为数据科学的一部分。回归是机器学习技术之一。在入侵检测方面,大多数文献的贡献主要是基于PCA、SVD、特征选择、特征约简技术和分类器算法的降维。现有文献对回归分析在入侵检测中的应用关注较少。基于回归的分析在入侵检测中有一定的应用范围。回归分析可用于降维、分类或预测任务。本文阐明了将回归分析应用于入侵检测的可能性,并概述了一些解决回归分析执行入侵检测的贡献。
{"title":"Regression analysis for network intrusion detection","authors":"Arun Nagaraja, U. Boregowda, V. Radhakrishna","doi":"10.1145/3460620.3460751","DOIUrl":"https://doi.org/10.1145/3460620.3460751","url":null,"abstract":"Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction using techniques such as PCA, SVD, feature selection, feature reduction techniques and application of classifier algorithms. Very less attention is paid on regression analysis for intrusion detection in the existing literature. There is a scope to apply regression-based analysis for intrusion detection. Regression analysis may be applied for dimensionality reduction, classification or prediction tasks. This paper throws light on the possibility of applying regression analysis for intrusion detection and outlines some of the contributions that addressed regression analysis to perform intrusion detection.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77914301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses 法学课程智能学习系统:法学课程智能学习系统
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460625
G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev
The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical rules. This training model is used to train teachers in digital literacy and distance learning in the context of Covid 19
提出的组织混合式和远程学习的模型包括创建个人学习路径,这使其具有灵活性。学习模型使用本体模型表示,模型的决策规则为逻辑规则。该培训模式用于在2019冠状病毒病背景下对教师进行数字扫盲和远程学习培训
{"title":"Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses","authors":"G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev","doi":"10.1145/3460620.3460625","DOIUrl":"https://doi.org/10.1145/3460620.3460625","url":null,"abstract":"The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical rules. This training model is used to train teachers in digital literacy and distance learning in the context of Covid 19","PeriodicalId":36824,"journal":{"name":"Data","volume":"70 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73835613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk Assessment in Smartphones: Comprehensive Analysis 智能手机的风险评估:综合分析
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460737
Mohammed Nasereddin, A. Qusef
Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for criminals, for their illegal practices, so it encountered serious and targeted security threats. This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.
智能手机是多用途和广泛使用的设备,在各个领域,在个人使用,公司和政府。对它们的依赖增加了对其使用者的侵犯,因为它成为犯罪分子非法行为的脂肪物质,因此它遇到了严重的和有针对性的安全威胁。本文提出了一套规则和控制措施,将减少威胁智能手机用户的风险。此外,这项工作提供了与智能手机相关的风险评估方法。它识别资产并列出几个相关的不同威胁。每个风险都有其对资产的影响,这是通过映射每个威胁的可能性来描述的。
{"title":"Risk Assessment in Smartphones: Comprehensive Analysis","authors":"Mohammed Nasereddin, A. Qusef","doi":"10.1145/3460620.3460737","DOIUrl":"https://doi.org/10.1145/3460620.3460737","url":null,"abstract":"Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for criminals, for their illegal practices, so it encountered serious and targeted security threats. This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76269303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Electronic Health Records in Polyclinics: Barriers & Benefits 电子健康记录在综合诊所的应用:障碍与益处
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460628
Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi
Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This study aims to identify the important barriers associated with the implementation of EHR in polyclinics and to measure the perception of healthcare staff and their knowledge about this system. A self-prepared modified questionnaire and 100 participants were involved in this study. The questionnaire was composed of three sections: section (A) was concerned with demographic data, Section (B) was related to the knowledge/attitude and the candidates' perception towards EHR, and whereas Section (C) was focused on the practical implementation of the e-health record such as what volunteer's perception about the benefits and concerns of the implementation of the system. There were different opinions, views, and perceptions among the health care staff who participated in the study. However, there is a general agreement among all participants to the factors that delay the implementation of the EHRs system in Libya. The results show a high cost of adopting EHRs, lack of experience with the use of computers, security concerns regarding the use of EHR systems, resistance to change and adopt new technology to be significant barriers when it comes to EHRs implementation and adoption.
电子健康档案(Electronic Health Records, EHRs)是健康信息学的众多扩展之一。它是一个计算机系统,用于收集、存储和显示患者信息。虽然有很多好处,但也有很多障碍影响着这些系统的实施。这些障碍可以是技术上的、财务上的、组织上的、个人的,甚至是法律上的。本研究旨在确定与在综合诊所实施电子健康档案相关的重要障碍,并测量医护人员对该系统的认知及其知识。本研究采用自行编制的修正问卷对100名被试进行调查。问卷由三部分组成:第(A)部分涉及人口统计数据,第(B)部分涉及知识/态度和候选人对电子健康档案的看法,而第(C)部分侧重于电子健康档案的实际实施,例如志愿者对实施该系统的好处和关注点的看法。参与研究的医护人员有不同的意见、观点和看法。然而,所有参与者对延迟利比亚实施电子病历系统的因素达成了普遍共识。结果显示,采用电子病历的成本高,缺乏使用计算机的经验,使用电子病历系统的安全问题,抵制改变和采用新技术是实施和采用电子病历的重大障碍。
{"title":"Application of Electronic Health Records in Polyclinics: Barriers & Benefits","authors":"Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi","doi":"10.1145/3460620.3460628","DOIUrl":"https://doi.org/10.1145/3460620.3460628","url":null,"abstract":"Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This study aims to identify the important barriers associated with the implementation of EHR in polyclinics and to measure the perception of healthcare staff and their knowledge about this system. A self-prepared modified questionnaire and 100 participants were involved in this study. The questionnaire was composed of three sections: section (A) was concerned with demographic data, Section (B) was related to the knowledge/attitude and the candidates' perception towards EHR, and whereas Section (C) was focused on the practical implementation of the e-health record such as what volunteer's perception about the benefits and concerns of the implementation of the system. There were different opinions, views, and perceptions among the health care staff who participated in the study. However, there is a general agreement among all participants to the factors that delay the implementation of the EHRs system in Libya. The results show a high cost of adopting EHRs, lack of experience with the use of computers, security concerns regarding the use of EHR systems, resistance to change and adopt new technology to be significant barriers when it comes to EHRs implementation and adoption.","PeriodicalId":36824,"journal":{"name":"Data","volume":"143 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy Saving Techniques in CoAP of Internet of Things 物联网CoAP中的节能技术
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460743
M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat
Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of the state of things, whether it is replacing or no. In the coming times,the world is adapting to apply the Internet of things in several major fields, among themost important domains that can integrate into it are industries, companies, healthcare, and communications. The inserted sensors of associated gadgets play out asignificant job and it has restricted energy abilities, many techniques studied theproblem of restricted energy. This works center around Application Layer methodsand explicitly on one of the main conventions, the Constrained Application Protocol(CoAP). We examine the most reasonable energy-effective procedures to actualizethe CoAP, and finally, we compare these techniques on different levels.
物联网是关联对象的连接,其中这些对象可以收集信息并利用传感器交换信息。物联网允许将物体和财产连接为一个单元,使我们能够控制我们想要的一切,并告诉我们事物的状态,无论它是否正在替换。在未来的时代,世界正在适应在几个主要领域应用物联网,其中最重要的领域可以集成到它是工业,公司,医疗保健和通信。相关器件的插入式传感器发挥着重要的作用,但它的能量能力有限,许多技术研究了能量有限的问题。这一工作围绕应用层方法展开,并明确地基于一个主要约定——约束应用协议(Constrained Application Protocol, CoAP)。我们研究了实现CoAP的最合理的节能程序,最后,我们在不同层次上比较了这些技术。
{"title":"Energy Saving Techniques in CoAP of Internet of Things","authors":"M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat","doi":"10.1145/3460620.3460743","DOIUrl":"https://doi.org/10.1145/3460620.3460743","url":null,"abstract":"Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of the state of things, whether it is replacing or no. In the coming times,the world is adapting to apply the Internet of things in several major fields, among themost important domains that can integrate into it are industries, companies, healthcare, and communications. The inserted sensors of associated gadgets play out asignificant job and it has restricted energy abilities, many techniques studied theproblem of restricted energy. This works center around Application Layer methodsand explicitly on one of the main conventions, the Constrained Application Protocol(CoAP). We examine the most reasonable energy-effective procedures to actualizethe CoAP, and finally, we compare these techniques on different levels.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85931267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault 使用第三方日志库的物联网(IoT)取证模型
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460746
Ahmed Hambouz, Yousef Shaheen, M. Ababneh
Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.
自过去十年以来,物联网(IoT)设备的数量急剧增加。因此,受影响的使用者和个人的数目也有所增加。到2025年,连接的物联网设备数量将达到754.4亿台。物联网设备环境的巨大增长增加了物联网威胁、风险和数字犯罪。因此,应制定有效的物联网取证模型,以满足物联网环境下的调查需求。本文引入了一种新的物联网取证模型来应对物联网取证的挑战。所提出的模型满足了安全性、机密性、完整性、可用性、身份验证和不可否认性需求。
{"title":"An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault","authors":"Ahmed Hambouz, Yousef Shaheen, M. Ababneh","doi":"10.1145/3460620.3460746","DOIUrl":"https://doi.org/10.1145/3460620.3460746","url":null,"abstract":"Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.","PeriodicalId":36824,"journal":{"name":"Data","volume":"13 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85615102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital transformation in Morocco by 2025: How ADD is catalysing this transformation? 到2025年摩洛哥的数字化转型:ADD如何促进这一转型?
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460762
Ismail Mhamdi, Hafid Barka
The Agency of Digital Development (ADD) is a strategic public entity placed under the supervision of the Ministry in charge of the Digital Economy. It has legal personality and financial autonomy and was created under Law No 61-16 published in the official bulletin dated August 30, 2017. ADD is an institutional actor responsible for implementing the State’s strategy for digital development and promoting the dissemination of digital tools and the development of their use among citizens. Indeed, ADD has a note of general guidelines for the digital development in Morocco by 2025; this note refers to three strategic axes.
数字发展局(ADD)是一个战略性的公共实体,隶属于负责数字经济的部门。它具有法人资格和财政自主权,是根据2017年8月30日官方公报上公布的第61-16号法律创建的。国家统计局是一个机构行为体,负责执行国家的数字发展战略,促进数字工具的传播和公民使用数字工具的发展。事实上,ADD有一份关于摩洛哥到2025年数字发展的总体指导方针的说明;本笔记涉及三个战略轴。
{"title":"Digital transformation in Morocco by 2025: How ADD is catalysing this transformation?","authors":"Ismail Mhamdi, Hafid Barka","doi":"10.1145/3460620.3460762","DOIUrl":"https://doi.org/10.1145/3460620.3460762","url":null,"abstract":"The Agency of Digital Development (ADD) is a strategic public entity placed under the supervision of the Ministry in charge of the Digital Economy. It has legal personality and financial autonomy and was created under Law No 61-16 published in the official bulletin dated August 30, 2017. ADD is an institutional actor responsible for implementing the State’s strategy for digital development and promoting the dissemination of digital tools and the development of their use among citizens. Indeed, ADD has a note of general guidelines for the digital development in Morocco by 2025; this note refers to three strategic axes.","PeriodicalId":36824,"journal":{"name":"Data","volume":"14 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78428163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1